PCI scan failed due to Beast exploit on port 443 and 10442

We had a PCI scan done and they checked the IP of the firewall and comes back with problems with port 443 and 10443 (SSL VPN) and the remidition is:

Affected users should disable all block-based cipher
suites in the server's SSL configuration and only support
RC4 ciphers, which are not vulnerable to fully address
this vulnerability. This vulnerability was addressed in
TLS version 1.1/1.2, however, support for these newer
TLS versions is not widely supported at the time of this
writing, making it difficult to disable earlier versions.
Additionally, affected users can also configure SSL to
prefer RC4 ciphers over block-based ciphers to limit, but
not eliminate, exposure. Affected users that implement
prioritization techniques for mitigation as described
above should appeal this vulnerability and include
details of the SSL configuration.

I have Fortigate 80CM and don't see where I can change that. I have disabled HTTPS mgmt on the interface and disabled SSL VPN so that should take care of this. However if I NMAP on those two ports it still shows as filtered unknown or udp open

PORT STATE SERVICE VERSION

10443/tcp filtered unknown

10443/udp open|filtered unknown

Too many fingerprints match this host to give specific OS details

I also created a firewall rule to block traffic from any to that WAN IP on port 10443 and 443 and still shows as filtered

Or is there a way to change to RC4 encryption so Trustwave's PCI scan doesn't find that vulnerability?

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !

If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data.
But that feeling is fleeting. Attacks these days can happen in many w…